单选题You are the administrator for Company’s network.You are using Windows Installer to deploy an application to 500 Windows 2000 Professional computerson your network. The network includes an organizational unit (OU) named Marketing. A Group Policyobject (GPO) is created for the Marketing OU.The software deployment of the application is unsuccessful. During the deployment, some users in theMarketing OU report that the installation is stopping with random errors midway through theinstallation process. The remaining users in the Marketing OU report that the software is installing but itis giving them general protection fault errors.You want the installation of the application to complete successfully.What should you do?()ARedeploy the application as a .zap file to the Marketing OU.BRedeploy the application by using the Group Policy object (GPO) for the Marketing OU.CRepackage and redeploy the application’s .msi file to the Marketing OU.DRepackage and redeploy the application’s .mst file to the Marketing OU.
单选题
You are the administrator for Company’s network.You are using Windows Installer to deploy an application to 500 Windows 2000 Professional computerson your network. The network includes an organizational unit (OU) named Marketing. A Group Policyobject (GPO) is created for the Marketing OU.The software deployment of the application is unsuccessful. During the deployment, some users in theMarketing OU report that the installation is stopping with random errors midway through theinstallation process. The remaining users in the Marketing OU report that the software is installing but itis giving them general protection fault errors.You want the installation of the application to complete successfully.What should you do?()
A
Redeploy the application as a .zap file to the Marketing OU.
B
Redeploy the application by using the Group Policy object (GPO) for the Marketing OU.
C
Repackage and redeploy the application’s .msi file to the Marketing OU.
D
Repackage and redeploy the application’s .mst file to the Marketing OU.
参考解析
解析:
暂无解析
相关考题:
You have a computer that runs Windows Vista. You create a virtual private network (VPN) connection between the computer and your company’s network.You notice that while the computer is connected through the VPN connection, users on the company network can access shared folders on the computer.You need to prevent network users from accessing your shared folders when you are connected to the company’s network by using the VPN connection.What should you do?()A.AB.BC.CD.D
You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()A、Configure weightB、Enable route reflectorC、Create a distribute listD、Enable the Longer Autonomous System path optionE、All of the above
You work as a network Exchange administrator at Company.com.The Company.com network currently consists of a single Active Directory forest containing a single domain named Company.com.The Company.com organization makes use of Microsoft Exchange Server 2010 as their messaging solution.Company.com has recently configured a user named Rory Allen as a Delegate for a user named Dean Austin.During the course of the business week you receive instruction from Company.com to ensurethat Rory Allen is able to add Dean Austin in the from field when sending messages whilst ensuring messages which contain Dean Austin in the From field should display Dean Austin s the message sender when the recipient receive the messages. What should you do?()A、You should consider having a Sharing policy created.You should then have Rory Allen granted Modify permission to Dean Austin’s mailbox.B、You should consider having a Sharing policy created.You should then have Rory Allen granted Full Mailbox permission to Dean Austin’s mailbox.C、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send As permission to Dean Austin’s Mailbox.D、You should consider having Rory Allen removed as a delegate.You should then have Rory Allen granted Send on Behalf permission to Dean Austin’s mailbox.
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.You receive a complaint from a Company.com employee named Mia Hamm stating that she is only able to access her mailbox using Outlook Web App.You need to make sure that she can access her Mailbox.What should you do?()A、You should consider enabling and set up Outlook Anywhere.B、You should consider setting up an Outlook Web App Mailbox policy.C、You should consider changing Mia Hamm’s mailbox features.D、You should consider removing Autodiscover record from the DNS zone.
You are the administrator of Company’s network.You install 50 new Windows 2000 Professional computers in the marketing department. Two weeks later,users report that five of the computers have stopped responding. You troubleshoot the five computers.You find that some users have installed unsigned device drivers that are not supported by Windows 2000Professional.You want to determine which drivers were installed by users.What should you do?()A、Run the chkdsk /f command on all drives on the computers.B、Configure Windows 2000 Professional to enable driver signing verification.C、Run the File Signature Verification tool on the computers.D、Run the System File Checker utility on the computers.
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. There is a database named Inventory on a SQL Server 2005 computer, and the computer is named SQL01. SQL01 is utilized to aggregate manufacturing part numbers from your company’s trading partners. And the company stores the manufacturing part numbers in the Product table in the Inventory database. The company requests the users to deliver data as text files from each trading partner to SQL1 every night. The data should be imported, and no duplicate manufacturing part numbers should exist in the data which is imported from the text files, and the text files are stored in the Inventory database on SQL01. You should cut the effect on your company’s trading partners and your IT department to the least. Which action should you perform?()A、First, you should import the data from each text file into a staging table. Second, you should write a query to have a HAVING clause contained so as to migrate replicate values before results are inserted into the Product table.B、First, you should make sure that each text file is stored in an Extensible Markup Language (XML) file. Second, you should utilize Extensible Stylesheet Language Transformations (XSLT) to automatically migrate replicates before data is imported into the Product table.C、First, you should make sure that the unique key values for manufacturing part numbers are utilized by each of your company’s trading partners utilizes. Second, you should import the text files into the Product table.D、You should place a unique index on the PartNum column.
You work as an Exchange Administrator for Xxx .The company has a Windows 2008 Active Directorybased network.You have just finished deploying an Exchange 2010 server and migrating all mailboxes including resource mailboxes from Exchange Server 2003. After the migration from the Exchange 2003 server was complete, you noticed that the resource mailboxes were showing up as a shared mailbox and not a resource mailbox.You realize that you need to convert them to Exchange 2010 resource mailboxes.While logged into the Exchange Management Console, you do not see any option to convert a mailbox. What should you use to convert this Exchange 2010 shared mailbox to an Exchange 2010 resource mailbox?()A、Exchange Troubleshooting AssistantB、Exchange System ManagerC、Exchange Management ShellD、Command prompt
Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()A、You should consider configuring the sender reputation.B、You should consider configuring the sender filtering.C、You should consider configuring the content filtering.D、You should consider configuring the recipient filtering.
You are the administrator of Company's Windows 2000 network. You have been asked to rollout a Windows 2000 Professional service pack on all Windows 2000 Professional client computers in Company's main office. You create a shared folder named InstallFiles that contains the installation files for the service pack and connect to the shared folder. You want to prevent the user interface from being displayed during the installation. What should you do? ()A、Connect to the InstallFiles shared folder and run the Update -q command.B、Connect to the InstallFiles shared folder and run the Update -u command.C、Connect to the InstallFiles shared folder and run the Update -z command.D、Connect to the InstallFiles shared folder and run the Update -s:InstallFiles command.
You are the administrator of Company's network.You install 50 new Windows 2000 Professional computers in the Web Development department. Twoweeks later, users report that five of the computers have stopped responding. You troubleshoot the fivecomputers. You find that users have attached devices and have installed device drivers that are notsupported by Windows 2000 Professional.You want to ensure that this does not happen again. You device to configure the computers to installdevice drivers only for devices that are included on the current Hardware Compatibility List (HCL).What should you do?()A、Configure the Administrator option to enable the Apply setting as system default option. B、Configure Windows 2000 Professional to enable driver signing verification. C、Use NTFS permissions to restrict user access to the /Winnt/Driver Cache folder. D、Use NTFS permissions to restrict user access to the /Winnt/System32/Drivers folder. E、Configure Windows 2000 Professional to trust the Microsoft Certificate Authority (CA).
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has merged with another company.The users at Company.com have complained that they are not able to share contacts with the users in the merge company.However, they can share free/busy information.The users at Company.com need to share contacts.What should you do?()A、You should consider changing the EWS virtual directory.B、You should consider changing the Federation Trust.C、You should consider changing the Organizational Relationship.D、You should consider changing the default sharing policy.
You are the network administrator for Company.You need to connect to Company’s network from your Windows 2000 Professional computer at home.You have a DSL line that is used for Internet connectivity. You create an L2TP virtual private network(VPN) connection and are able to connect successfully to Company’s network. While connected toCompany’s network, you are unable to access the Internet.You want to be able to access the Internet while connected to Company’s network.How should you configure the connection properties?()A、Configure the DSL connection to use PPTP instead of L2TP. B、Enable Internet Connection Sharing for the DSL connection properties. C、CLEAR THE Use default gateway on remote network check box. D、Clear the Require data encryption check box.
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.To secure SSL, you have set up the Outlook Web App (OWA).A Company.com employee named Mia Hamm complains that she gets a Web site security certificate warning message when connecting to the Outlook Web App.You need to make sure that she does not get any warning message from the Outlook Web App. What should you do?()A、You should consider installing the server’s root certificate into the Trusted Root Certification Authorities store on the Client Access server.B、You should consider accessing the Exchange Management Console (EMC) and assign an Outlook Web App mailbox policy to Mia Hamm.C、You should consider installing the server’s root certificate into the Trusted Root Certification Authorities store on Mia Hamm’s client workstation.D、You should consider accessing the Exchange Management Console (EMC) and set up the logon format to use the user principal name (UPN), in the owa (Default Web Site) Properties.
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? () A、The contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS) B、You should restore a backup to the active node C、You should get rid of the shared array from the active node D、From the active node, you have to uplug the network cable(s)
单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated. Which action should be performed by you?()AA domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.BA local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.COne SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.DA SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.EA virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.
问答题Practice 11 ● You are the Manager of a small printing company. A new employee, Mark McCabe, is joining your company on 10th May. ● Write a short memo to your office administrator. ● Saying who is starting work and when; ● Telling him what Mark McCabe’s desk should be put; ● Suggesting where Mark McCabe’s job will be. ● Write 30—40 words on your answer sheet.
多选题You are the administrator of Company's network.You install 50 new Windows 2000 Professional computers in the Web Development department. Twoweeks later, users report that five of the computers have stopped responding. You troubleshoot the fivecomputers. You find that users have attached devices and have installed device drivers that are notsupported by Windows 2000 Professional.You want to ensure that this does not happen again. You device to configure the computers to installdevice drivers only for devices that are included on the current Hardware Compatibility List (HCL).What should you do?()AConfigure the Administrator option to enable the Apply setting as system default option.BConfigure Windows 2000 Professional to enable driver signing verification.CUse NTFS permissions to restrict user access to the /Winnt/Driver Cache folder.DUse NTFS permissions to restrict user access to the /Winnt/System32/Drivers folder.EConfigure Windows 2000 Professional to trust the Microsoft Certificate Authority (CA).
单选题You are the administrator of your company’s network. Using Windows Installer packages, you want to install customized versions of Microsoft Excel on different departments in the company. Which type of file should you apply to the installation database?()AmsiBmstCzapDzip
单选题You are the administrator of a company with BGP connections to multiple ISP’s. How could youconfigure BGP to make it favor one particular ISP for outbound traffic?()AConfigure weightBEnable route reflectorCCreate a distribute listDEnable the Longer Autonomous System path optionEAll of the above
多选题You are the administrator of a Windows 2000 Professional computer, which has a 56 Kbps modem, connected to itself. You want the users on your company’s network to be able to connect to the Internet using your computer. But, you do not want to allow any other operations than HTTP and FTP. Which ports will you allow through this connection? ()APort 80BPort 21CPort 25DPort 81
单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. Now you get an order from your company CIO, you have to identify whether a database integrity check (DBCC CHECKDB) was run for a particular database. Which log file should you examine?()Alog.trc Bdefault.trc CERRORLOG DSQLAGENT
单选题Company.com has employed you as their Exchange administrator.The Company.com network contains an Exchange Server 2010 Organization.You are responsible for managing the Company.com network.You receive an instruction from management to reject e-mail messages that have a spam confidence level (SCL) of 5.You thus decide to configure the organization to accomplish this task. What should you do?()AYou should consider configuring the sender reputation.BYou should consider configuring the sender filtering.CYou should consider configuring the content filtering.DYou should consider configuring the recipient filtering.
单选题You want to install Windows 2000 Professional on 45 new computers on your company’s network. You first install Windows 2000 Professional on one of the new computers. You log on to the computer by using the local administrator account. You install Microsoft Office 97, a virus scanner, and other company-standard applications. You then create a RIS image of the computer you configured. You want to configure the RIS image so that the standard applications will be accessible to the user when the user first logs on to the network. What should you do?()ARun Rbfg.exe before installing the standard applications. BRun RIPrep.exe before installing the standard applications. CCopy the all users profile to the default users profile.DCopy the local administrator account profile to the default users profile
单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do? ()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.
单选题You are the network administrator for your company. All network servers run Windows Server 2003. All client computers run Windows XP Professional. A member server named Server1 is located at a branch office that does not permit the use of Remote Desktop Protocol. Another administrator uses the Backup utility to create a scheduled backup job on Server1. The backup job performs a normal backup of an application server. The application server is removed from the network. You need to use a client computer to remove the backup job from Server1. You cannot travel to the branch office. What should you do?()AUse the RUNAS feature to run the at /delete command as the Server1/Administrator account.BLog on by using your Administrator account and run the ntbackup /D command.CLog on by using your Administrator account and run the schtasks /delete command.DUse the RUNAS feature to run the taskkill command as the Server1/Administrator account.
多选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 cluster. According to the company requirement, the failover response of the cluster has to be tested. The company assigns this task to you. On the cluster, you have to implement a manual failover. What should you do? ()AThe contents of a shared folder on the active node should be encrypted by using Encrypting File System (EFS)BYou should restore a backup to the active nodeCYou should get rid of the shared array from the active nodeDFrom the active node, you have to uplug the network cable(s)